vllm-ascend-deploy
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses SSH to execute arbitrary shell commands on remote systems throughout the deployment and status-checking phases.
- [COMMAND_EXECUTION]: Deployment scripts create Docker containers with the
--privilegedflag, which grants the container nearly unrestricted access to the host system resources. - [COMMAND_EXECUTION]: The
scripts/start_service.shscript uses theLD_PRELOADenvironment variable to inject thelibjemalloc.so.2library into the vLLM process at runtime. - [CREDENTIALS_UNSAFE]: The instructions prompt the user to provide SSH passwords and automate the modification of the remote host's
authorized_keysfile to ensure persistent passwordless access. - [REMOTE_CODE_EXECUTION]: The skill implements a service monitoring loop using
cronjobs that trigger agent logic to periodically perform SSH and Docker operations. - [DATA_EXFILTRATION]: The monitoring script
scripts/monitor.shsends service status updates and log excerpts to a vendor-provided notification endpoint athttp://xiaoluban.rnd.huawei.com:80/.
Audit Metadata